Top 6 Considerations For Cloud Security and Data Protection

Cloud computing exposes organizations to substantial new security risks, which often means taking a new approach to cloud security. Remember, even if you are using a public cloud service for data storage, it is your data and ultimately your responsibility for security, data protection and regulatory compliance.

Given the challenges and risks, it is no surprise that security and data protection remain the chief concerns for security professionals in moving to the cloud. A recent study found that their their top concerns are: protection against data loss (57%); threats to data privacy (49%); and breaches of confidentiality (47%).

There are ways to mitigate these risks and reduce these concerns. Most public cloud providers have very clear and explicit shared responsibility models. Make sure you understand those models and where your responsibility begins and ends.

In addition, it is important to work with a provider that is not only focused on security, but also takes extra steps to strengthen protections against data loss, threats to data privacy and breaches of confidentiality. Here are six top considerations to keep in mind when evaluating a cloud storage platform for secure data management.

Geo-resiliency: When you think of the cloud, it’s easy to forget that you are actually talking about physical data centers and not some ethereal objects in the sky. When you are considering cloud providers, make sure to ask what kinds of protections and resiliency features they provide against physical threats. Also ask about the capabilities and locations of their physical data centers and how they assure security protections and disaster recovery.

Advanced networking options: One of the biggest security risks with some public cloud services is that your data can be exposed to the public Internet. That doesn’t have to be the case. With the right solution, such as the Iron Cloud from Iron Mountain, you can leverage a carrier-grade network that allows for high data throughput with optional dedicated circuits, including a dedicated Virtual Private Network.

Data isolation with an offline gold copy: Ransomware is a rapidly growing security threat. Even if your data is in the cloud, there is still the risk of infection. The safest preparation against ransomware is to have your data isolated off-line, typically in a tape vault. Does your cloud provider offer an offline gold copy as part of its overall data management services? With most providers, you will have to set up a separate operation and infrastructure to achieve that. Iron Mountain’s Iron Cloud is the one exception, offering integrated offline protection as part of its service capabilities.

Data encrypted in transit and at rest: When you are moving data to the cloud or between clouds, it is particularly vulnerable to loss or attack because you can lose visibility and not be aware of problems until they are too late. By encrypting data both at rest and in transit, your provider can offer an extra layer of protection that can significantly reduce risk of data loss or exposure of confidential records.

Role-based access controls: Consistent enforcement of policies and governance is a critical aspect of cyber security. In managing your data in the cloud, you should leverage services that support enforcement of role-based protections such as role assignment, role authorization and transaction authorization.

Flexibility in deployment models: Many of the leading public cloud services offer limited deployment options that are not specifically focused on the security challenges of data management. They are typically designed for volume rather than security. In evaluating suppliers for data management, look for these key capabilities to ensure you have the flexibility to address today’s most pressing security and compliance concerns:

Multiple deployment models, including private, public and hybrid cloud.

ConclusionCloud services are becoming an integral part of IT and data environments. Cloud spending is growing by 20% year over year, and more than three quarters of firms are piloting, implementing or already operating in the cloud, according to a recent study. As companies continue to transform their businesses with technology, cloud has become a vital platform for data management.

In leveraging the cloud as a data management platform, you should use providers that are focused on security. Your data is too important to risk, and the impact of a breach or compliance event can have a devastating impact on your business. When it comes to security, no company can match the experience, reliability and reputation of Iron Mountain. To learn how Iron Cloud can help secure your data in the cloud, please visit Iron Mountain at http://www.ironmountain.com